Secure IoT identities
The Internet-of-Things is extremely important today, and security is essential for a smooth running IoT. To achieve this, it is crucial we solve the main challenge of secure identities for constrained IoT devices and find efficient ways to deal with the many identity technologies in use.
Different ecosystems have disparate needs and practices. Yet it is clear that automation and zero touch mass registration is necessary for scaling up to billions of devices. A secure identity – anchored in hardware – is at the centre.
Ericsson, ARM, and u‑blox have joined forces to address this issue. Together, we have developed a concept that can integrate and secure IoT devices from any ecosystem – something that is necessary to enable IoT deployments to move to massive scale.
A prototype using well‑proven security technology from mobile networks, implemented on a u‑blox device utilising ARM mbed OS 5, was demonstrated at this year’s Mobile World Congress.
The importance of security in IoT
Internet of Things comprises billions of connected devices, most of which are small size, low cost, low power, constrained in terms of processing power and storage, operate unattended and can be expected to run more than ten years.
Close‑to‑zero cost for roll‑out, provisioning, and operation will be necessary, calling for automated processes.
Security and privacy are among the major concerns for businesses adopting IoT. This increases with the growing significance of IoT in corporate, government, and critical infrastructure contexts. New IoT devices’ being deployed in new use cases brings significant security challenges.
Secure identities are key components in this context. Two important aspects are needed: an efficient identity technology that can be used also on very constrained devices, and management of these identities during the lifetime of the device.
IoT security terms and concepts
How can secure environments be provided for IoT? Different ecosystems have unique needs and practices. We believe the diversity will continue for at least the foreseeable future, and the best way is to focus on brokering of existing, successful technologies, as a needed solution bridging different ecosystems.
Some key terms and concepts – a brief overview is included at the end of the post.
- Device identity.
- Crypto schemes.
- Root of trust.
- Device authentication and agreeing on keys.
Proof of concept demonstration
Ericsson, ARM, and u‑blox have joined forces to create a concept for integrating and securing IoT devices from any ecosystem. This is key to moving IoT deployments to massive scale with zero cost and for IoT to be trusted when involving actors from all concerned ecosystems.
Only a small portion of IoT devices will connect to the Internet via cellular networks. However, the well proven Authentication and Key Agreement (AKA) technology from the cellular networks can be used also when connecting over non‑cellular networks and for constrained IoT devices, where saving on power, size, and cost are crucial.
The proof‑of‑concept uses ARMv7‑M based devices running ARM mbed OS 5, which contains an mbed uVisor – a hardware‑enforced hypervisor – that allows for creating a trusted execution environment with a strong enough security level to securely store device and AKA identities in the device.
Future versions targets ARMv8‑M based devices with ARM Trustzone. We leverage the AKA procedure and the EAP‑AKA approach for non‑cellular access to get an efficient low cost identity solution on the device side and securely provision the identities to the device using the Lightweight Machine‑to‑Machine (LWM2M) protocol.
To illustrate the concept, we use a smart goods delivery setup, where each parcel contains a constrained device. The solution is implemented on an u‑blox ODIN‑W2 stand‑alone IoT gateway module with WiFi and Bluetooth utilising ARM mbed OS 5.
Eco system engagement
Jan Höller from Ericsson Research commented: “By working with leading companies in the ecosystem, we want to ensure that secure IoT solutions become available to users and developers from all different sectors. Interoperability is key for IoT to take off in a massive way, and secure solutions is one of the hardest nuts to crack, so we went for jointly solving that one”.
“Secure device authentication is a key challenge to deploying constrained IoT devices at scale,” according to Michael Horne, Vice President, IoT Business, ARM. “In order to tackle this, we are collaborating with Ericsson and u‑blox to architect in secure system provisioning through the ARM mbed IoT Device Platform. This will enable all enterprises to build secure IoT solutions quickly.”
Håkan Svegerud, Product Strategy, Product Centre Short Range Radio, u‑blox, said: “As u‑blox provides wireless and positioning modules and chips for a wealth of different IoT applications, we have created a security ‘roadmap’ with five critical areas to our product security. This collaboration with market leaders comes as a great opportunity to implement secure IoT solutions on a larger scale.”
Life cycle management
Across the device lifecycle, different stakeholders have different interests and responsibilities to interact with the device in a secure way. It starts at the manufacturing of the chip, then into an automated process of device OEMs, system integrators and solution providers, on to users, application service providers and network providers. Managing security and IoT device identities and the trust relations will be critical in this process and it needs to be done with minimal manual intervention.
Brokering of generic IDs and the relations is needed. For more reading on IoT Security, please check out Ericsson’s IoT Security topic page.
IoT Security terms and concepts explained:
The device identity is normally a boot strap credential together with a device identifier. The credential is generated or set during manufacturing and used to securely download other sets of credentials used for things like authentication, connectivity, management. The device identifier does not need to be secret but (a part of) the credentials need to be.
Credentials use crypto schemes which usually are symmetric or asymmetric. Symmetric schemes are light‑weight and require a secret key shared between the communicating parties and authentication is implicitly done through this shared secret. Asymmetric schemes use a public and a private key pair. In this case, we need additional assurances to know that a public key really belongs to the intended recipient, so certificates are often used.
Root of trust
Bootstrapping a secure system or device involves a chain of steps, where each step relies on the correctness and security of the previous one, also called a chain of trust. At the end of the chain we assume or verify the correctness of the last step – this step becomes the Root of Trust (RoT). It is implemented so that is it very hard to break that trust.
Using the RoT and other parts of the device one establishes a Trusted Execution Environment (TEE). The TEE often uses a hardware- separated area of the device, such as ARM Trustzone or a UICC. The latter has tough requirements on for example tamper resistance and security evaluations.
Device authentication and agreement on keys
Identities also play a key role for the functions of device authentication and agreeing on keys for communication protection. The Authentication and Key Agreement (AKA) protocol defined by the 3GPP standard is a well‑proven technology to provide these two functions. It is based on a symmetric scheme and includes mutual authentication, which for example prevents use of fake base stations.
Guest blog by Ben Smeets, Senior Expert in Security research area, Ericsson Research, and Per Ståhl, Master Researcher in Security research area, Ericsson Research.
Courtesy of u-blox.